Lightweight RFID Mutual Authentication Protocol against Feasible Problems
Abstract
References
Index Terms
- Lightweight RFID Mutual Authentication Protocol against Feasible Problems
Recommendations
Lightweight RFID mutual authentication protocol against feasible problems
ICICS'11: Proceedings of the 13th international conference on Information and communications securityThe wide deployment of RFID systems has raised many concerns about the security and privacy. Many RFID authentication protocols are proposed for these low-cost RFID tags. However, most of existing RFID authentication protocols suffer from some feasible ...
An attack on an RFID authentication protocol conforming to EPC class 1 generation 2 standard
ICHIT'11: Proceedings of the 5th international conference on Convergence and hybrid information technologyRadio Frequency Identification (RFID) is taking place of barcodes in our lives, thanks to its remote identification capability. However, being transmitted via radio waves, the information is exposed to many possible attacks, which may endanger the ...
A Secure and Efficient Deniable Authentication Protocol
ICIE '09: Proceedings of the 2009 WASE International Conference on Information Engineering - Volume 02A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication protocols have been proposed, most of them are interactive or vulnerable to various cryptanalytic attacks. To find a secure and ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Editors:
- Sihan Qing,
- Willy Susilo,
- Guilin Wang,
- Dongmei Liu
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in